[BACK]Return to 73.html CVS log [TXT][DIR] Up to [local] / www

File: [local] / www / 73.html (download) (as text)

Revision 1.7, Mon Mar 27 01:15:26 2023 UTC (14 months ago) by jsg
Branch: MAIN
Changes since 1.6: +7 -0 lines

initial drm notes

<!doctype html>
<html lang=en id=release>
<head>
<meta charset=utf-8>

<title>OpenBSD 7.3</title>
<meta name="description" content="OpenBSD 7.3">
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="stylesheet" type="text/css" href="openbsd.css">
<link rel="canonical" href="https://www.openbsd.org/73.html">
</head><body>
<h2 id=OpenBSD>
<a href="index.html">
<i>Open</i><b>BSD</b></a>
7.3
</h2>

<table>
<tr>
<td>
<a href="images/XXX.png">
<img width="227" height="303" src="images/XXX-s.gif" alt="XXX"></a>
<td>
Released Apr XXX, 2023. (54th OpenBSD release)<br>
Copyright 1997-2023, Theo de Raadt.<br>
<br>
Artwork by XXX.
<br>
<ul>
<li>See the information on <a href="ftp.html">the FTP page</a> for
    a list of mirror machines.
<li>Go to the <code class=reldir>pub/OpenBSD/7.3/</code> directory on
    one of the mirror sites.
<li>Have a look at <a href="errata73.html">the 7.3 errata page</a> for a list
    of bugs and workarounds.
<li>See a <a href="plus73.html">detailed log of changes</a> between the
    7.2 and 7.3 releases.
<p>
<li><a href="https://man.openbsd.org/signify.1">signify(1)</a>
    pubkeys for this release:<p>

<table class=signify>
<tr><td>
openbsd-73-base.pub:
<td>
<a href="https://ftp.openbsd.org/pub/OpenBSD/7.3/openbsd-73-base.pub">
RWQS90bYzZ4XFms5z9OodrFABHMQnW6htU+4Tmp88NuQiTEezMm2cQ3K</a>
<tr><td>
openbsd-73-fw.pub:
<td>
RWRSJW95RokBEZUxBFvPCEdtQPg2WMExzMIcjnXzVpIwUpyZZmfXun5a
<tr><td>
openbsd-73-pkg.pub:
<td>
RWTJxSCZzSPKGp8unIp/yxG2lvCXJg5lFVvbOBQUvKEnGHFAO8RPg3mr
<tr><td>
openbsd-73-syspatch.pub:
<td>
RWShXqVD7hfbBpWb1B5EGr1DUX8kkjkTueCsa243lLNocuuVU+2eWMn5
</table>
</ul>
<p>
All applicable copyrights and credits are in the src.tar.gz,
sys.tar.gz, xenocara.tar.gz, ports.tar.gz files, or in the
files fetched via <code>ports.tar.gz</code>.
</table>

<hr>

<section id=new>
<h3>What's New</h3>
<p>
This is a partial list of new features and systems included in OpenBSD 7.3.
For a comprehensive list, see the <a href="plus73.html">changelog</a> leading
to 7.3.

<ul>

<li>New/extended platforms:
  <ul>
  <li>...
  </ul>

<li>Various kernel improvements:
  <ul>
  <li>...
  </ul>

<li>SMP Improvements
  <ul>
  <li>...
  </ul>

<li>Direct Rendering Manager and graphics drivers
  <ul>
  <li>Updated <a href="https://man.openbsd.org/drm.4">drm(4)</a>
      to Linux 6.1.15
  <li><a href="https://man.openbsd.org/drm.4">amdgpu(4)</a>:
      support for Ryzen 7000 "Raphael", Ryzen 7020 series "Mendocino",
      Ryzen 7045 series "Dragon Range",
      Radeon RX 7900 XT/XTX "Navi 31",
      Radeon RX 7600M (XT), 7700S, 7600S "Navi 33"
  <li>...
  </ul>

<li>VMM/VMD improvements
  <ul>
  <li>...
  </ul>

<li>Various new userland features:
  <ul>
  <li>...
  </ul>

<li>Various bugfixes and tweaks in userland:
  <ul>
  <li>...
  </ul>

<li>Improved hardware support and driver bugfixes, including:
  <ul>
  <li>...
  </ul>

<li>New or improved network hardware support:
  <ul>
  <li>...
  </ul>

<li>Added or improved wireless network drivers:
  <ul>
  <li>...
  </ul>

<li>IEEE 802.11 wireless stack improvements and bugfixes:
  <ul>
  <li>...
  </ul>

<li>Installer, upgrade and bootloader improvements:
  <ul>
  <li>...
  </ul>

<li>Security improvements:
  <ul>
  <li>...
  </ul>

<li>Changes in the network stack:
  <ul>
  <li>...
 </ul>

<li>Routing daemons and other userland network improvements:
  <ul>
  <li>IPsec support was improved:
  <ul>
	<li>...
  </ul>
  <li>In <a href="https://man.openbsd.org/bgpd.8">bgpd(8)</a>,
  <ul>
	<li>...
  </ul>
  <li><a href="https://man.openbsd.org/rpki-client.8">rpki-client(8)</a> saw some changes:
  <ul>
	<li>...
  </ul>

  <li>In <a href="https://man.openbsd.org/snmpd.8">snmpd(8)</a>,
  <ul>
	<li>...
  </ul>

  <li>...
  </ul>

<li><a href="https://man.openbsd.org/tmux.1">tmux(1)</a> improvements and bug fixes:
  <ul>
  <li>...
  </ul>

<li>LibreSSL version 3.7.2
  <ul>
  <li>New features
    <ul>
    <li>Added Ed25519 support both as a primitive and via OpenSSL's EVP interfaces.
    <li>X25519 is now also supported via EVP.
    <li>The OpenSSL 1.1 raw public and private key API is available with support for
        EVP_PKEY_ED25519, EVP_PKEY_HMAC and EVP_PKEY_X25519. Poly1305 is not
        currently supported via this interface.
    <li>Added EVP_CIPHER_meth_*() setter API.
    <li>Added various X.509 accessor functions.
    </ul>

  <li>Compatibility changes
    <ul>
    <li>BIO_read() and BIO_write() now behave more closely to OpenSSL 3 in
        various corner cases.
    </ul>

  <li>Bug fixes
    <ul>
    <li>Added EVP_chacha20_poly1305() to the list of all ciphers.
    <li>Fixed potential leaks of EVP_PKEY in various printing functions
    <li>Fixed potential leak in OBJ_NAME_add().
    <li>Avoid signed overflow in i2c_ASN1_BIT_STRING().
    <li>Cleaned up EVP_PKEY_ASN1_METHOD related tables and code.
    <li>Fixed long standing bugs BN_GF2m_poly2arr() and BN_GF2m_mod().
    <li>Fixed segfaults in BN_{dec,hex}2bn().
    <li>Fixed NULL dereference in x509_constraints_uri_host() reachable only
        in the process of generating certificates.
    <li>Fixed a variety of memory corruption issues in BIO chains coming
        from poor old and new API: BIO_push(), BIO_pop(), BIO_set_next().
    <li>Avoid potential divide by zero in BIO_dump_indent_cb()
    <li>Fixed a memory leak, a double free and various other issues in
        BIO_new_NDEF().
    <li>Fixed various crashes in the openssl(1) testing utility.
    <li>Do not check policies by default in the new X.509 verifier.
    <li>Avoid crash with ASN.1 BOOLEANS in openssl(1) asn1parse.
    <li>Added missing error checking in PKCS7.
    <li>Call CRYPTO_cleanup_all_ex_data() from OPENSSL_cleanup().
    </ul>

  <li>Documentation improvements
    <ul>
    <li>Numerous improvements and additions for ASN.1, BIO, BN, and X.509.
    <li>The BN documentation is now considered to be complete.
    <li>Marked BIO_s_log(3) BIO_nread0(3), BIO_nread(3), BIO_nwrite0(3), BIO_nwrite(3),
        BIO_dump_cb(3) and BIO_dump_indent_cb(3) as intentionally undocumented.
    <li>Documented various BIO_* interfaces.
    <li>Documented ED25519_keypair(3), ED25519_sign(3), and ED25519_verify(3).
    <li>Documented EVP_PKEY raw private/public key interfaces.
    <li>Documented ASN1_buf_print(3).
    <li>Documented DH_get0_*, DSA_get0_*, ECDSA_SIG_get0_* and RSA_get0_*.
    <li>Merged documentation of UI_null() from OpenSSL 1.1
    <li>Various spelling and other documentation improvements.
    </ul>

  <li>Internal improvements
    <ul>
    <li>Remove dependency on system timegm() and gmtime() by replacing
        traditional Julian date conversion with POSIX epoch-seconds date
        conversion from BoringSSL.
    <li>Removed old and unused BN code dealing with primes.
    <li>Started rewriting name constraints code using CBS.
    <li>Removed support for the HMAC PRIVATE KEY.
    <li>Reworked DSA signing and verifying internals.
    <li>Rewrote the TLSv1.2 key exporter.
    <li>Cleaned up and refactored various aspects of the legacy TLS stack.
    <li>Initial overhaul of the BIGNUM code:
      <li>Added a new framework that allows architecture-dependent
          replacement implementations for bignum primitives.
      <li>Imported various s2n-bignum's constant time assembly primitives
          and switched amd64 to them.
      <li>Lots of cleanup, simplification and bug fixes.
    <li>Changed Perl assembly generators to move constants into .rodata,
        allowing code to run with execute-only permissions.
    <li>Capped the number of iterations in DSA and ECDSA signing (avoiding
        infinite loops), added additional sanity checks to DSA.
    <li>ASN.1 parsing improvements.
    <li>Cleanup and improvements in EC code, including always clearing EC
        groups and points on free.
    <li>Various openssl(1) improvements.
    <li>Various nc(1) improvements.
    </ul>

  <li>Security fixes
    <ul>
    <li>A malicious certificate revocation list or timestamp response token
        would allow an attacker to read arbitrary memory.
    </ul>
  </ul>

<li>OpenSSH XXX.YYY
  <ul>
  <li>Security
    <ul>
    <li>...
    </ul>
  <li>Potentially-incompatible changes
    <ul>
    <li>...
    </ul>
  <li>Bugfixes
    <ul>
    <li>...
    </ul>
  </ul>

<li>mandoc XXX plus some new features and many bugfixes, including:
  <ul>
  <li>...
  </ul>

<li>Ports and packages:
  <p>Many pre-built packages for each architecture:
  <!-- number of FTP packages minus SHA256, SHA256.sig, index.txt -->
  <ul style="column-count: 3">
    <li>aarch64:    
    <li>amd64:      11764
    <li>arm:        
    <li>i386:       
    <li>mips64:     
    <li>powerpc:    
    <li>powerpc64:  
    <li>riscv64:    
    <li>sparc64:    
  </ul>

  <p>Some highlights:
  <ul style="column-count: 3"><!-- XXX all need to be checked/updated 2023-03-04 -->
    <li>Asterisk 16.28.0, 18.14.0 and 19.6.0
    <li>Audacity 2.4.2
    <li>CMake 3.24.2
    <li>Chromium 105.0.5195.125
    <li>Emacs 28.2
    <li>FFmpeg 4.4.2
    <li>GCC 8.4.0 and 11.2.0
    <li>GHC 9.2.4
    <li>GNOME 42.4
    <li>Go 1.19.1
    <li>JDK 8u342, 11.0.16 and 17.0.4
    <li>KDE Applications 22.08.1
    <li>KDE Frameworks 5.98.0
    <li>Krita 5.1.1
    <li>LLVM/Clang 13.0.0
    <li>LibreOffice 7.4.1.2
    <li>Lua 5.1.5, 5.2.4 and 5.3.6
    <li>MariaDB 10.9.3
    <li>Mono 6.12.0.182
    <li>Mozilla Firefox 105.0.1 and ESR 102.3.0
    <li>Mozilla Thunderbird 102.3.0
    <li>Mutt 2.2.7 and NeoMutt 20220429
    <li>Node.js 16.17.1
    <li>OCaml 4.12.1
    <li>OpenLDAP 2.6.3
    <li>PHP 7.4.30, 8.0.23 and 8.1.10
    <li>Postfix 3.7.2
    <li>PostgreSQL 14.5
    <li>Python 2.7.18, 3.9.14 and 3.10.7
    <li>Qt 5.15.6 and 6.3.1
    <li>R 4.2.1
    <li>Ruby 2.7.6, 3.0.4 and 3.1.2
    <li>Rust 1.63.0
    <li>SQLite 3.39.3
    <li>Shotcut 22.06.23
    <li>Sudo 1.9.11.2
    <li>Suricata 6.0.6
    <li>Tcl/Tk 8.5.19 and 8.6.12
    <li>TeX Live 2021
    <li>Vim 9.0.0192 and Neovim 0.7.2
    <li>Xfce 4.16
  </ul>
  <p>

<li>As usual, steady improvements in manual pages and other documentation.

<li>The system includes the following major components from outside suppliers:
  <ul><!-- XXX all need to be checked/updated 2023-03-04 -->
    <li>Xenocara (based on X.Org 7.7 with xserver 21.1.4 + patches,
        freetype 2.12.1, fontconfig 2.13.94, Mesa 22.1.7, xterm 372,
        xkeyboard-config 2.20, fonttosfnt 1.2.2 and more)
    <li>LLVM/Clang 13.0.0 (+ patches)
    <li>GCC 4.2.1 (+ patches) and 3.3.6 (+ patches)
    <li>Perl 5.32.1 (+ patches)
    <li>NSD 4.6.0
    <li>Unbound 1.16.3
    <li>Ncurses 5.7
    <li>Binutils 2.17 (+ patches)
    <li>Gdb 6.3 (+ patches)
    <li>Awk September 12, 2022
    <li>Expat 2.4.9
  </ul>

</ul>
</section>

<hr>

<section id=install>
<h3>How to install</h3>
<p>
Please refer to the following files on the mirror site for
extensive details on how to install OpenBSD 7.3 on your machine:

<ul>
<li><a href="https://ftp.openbsd.org/pub/OpenBSD/7.3/alpha/INSTALL.alpha">
	.../OpenBSD/7.3/alpha/INSTALL.alpha</a>
<li><a href="https://ftp.openbsd.org/pub/OpenBSD/7.3/amd64/INSTALL.amd64">
	.../OpenBSD/7.3/amd64/INSTALL.amd64</a>
<li><a href="https://ftp.openbsd.org/pub/OpenBSD/7.3/arm64/INSTALL.arm64">
	.../OpenBSD/7.3/arm64/INSTALL.arm64</a>
<li><a href="https://ftp.openbsd.org/pub/OpenBSD/7.3/armv7/INSTALL.armv7">
	.../OpenBSD/7.3/armv7/INSTALL.armv7</a>
<li><a href="https://ftp.openbsd.org/pub/OpenBSD/7.3/hppa/INSTALL.hppa">
	.../OpenBSD/7.3/hppa/INSTALL.hppa</a>
<li><a href="https://ftp.openbsd.org/pub/OpenBSD/7.3/i386/INSTALL.i386">
	.../OpenBSD/7.3/i386/INSTALL.i386</a>
<li><a href="https://ftp.openbsd.org/pub/OpenBSD/7.3/landisk/INSTALL.landisk">
	.../OpenBSD/7.3/landisk/INSTALL.landisk</a>
<li><a href="https://ftp.openbsd.org/pub/OpenBSD/7.3/loongson/INSTALL.loongson">
	.../OpenBSD/7.3/loongson/INSTALL.loongson</a>
<li><a href="https://ftp.openbsd.org/pub/OpenBSD/7.3/luna88k/INSTALL.luna88k">
	.../OpenBSD/7.3/luna88k/INSTALL.luna88k</a>
<li><a href="https://ftp.openbsd.org/pub/OpenBSD/7.3/macppc/INSTALL.macppc">
	.../OpenBSD/7.3/macppc/INSTALL.macppc</a>
<li><a href="https://ftp.openbsd.org/pub/OpenBSD/7.3/octeon/INSTALL.octeon">
	.../OpenBSD/7.3/octeon/INSTALL.octeon</a>
<li><a href="https://ftp.openbsd.org/pub/OpenBSD/7.3/powerpc64/INSTALL.powerpc64">
	.../OpenBSD/7.3/powerpc64/INSTALL.powerpc64</a>
<li><a href="https://ftp.openbsd.org/pub/OpenBSD/7.3/riscv64/INSTALL.riscv64">
	.../OpenBSD/7.3/riscv64/INSTALL.riscv64</a>
<li><a href="https://ftp.openbsd.org/pub/OpenBSD/7.3/sparc64/INSTALL.sparc64">
	.../OpenBSD/7.3/sparc64/INSTALL.sparc64</a>
</ul>
</section>

<hr>

<section id=quickinstall>
<p>
Quick installer information for people familiar with OpenBSD, and the use of
the "<a href="https://man.openbsd.org/disklabel.8">disklabel</a> -E" command.
If you are at all confused when installing OpenBSD, read the relevant
INSTALL.* file as listed above!

<h3>OpenBSD/alpha:</h3>

<p>
If your machine can boot from CD, you can write <i>install73.iso</i> or
<i>cd73.iso</i> to a CD and boot from it.
Refer to INSTALL.alpha for more details.

<h3>OpenBSD/amd64:</h3>

<p>
If your machine can boot from CD, you can write <i>install73.iso</i> or
<i>cd73.iso</i> to a CD and boot from it.
You may need to adjust your BIOS options first.

<p>
If your machine can boot from USB, you can write <i>install73.img</i> or
<i>miniroot73.img</i> to a USB stick and boot from it.

<p>
If you can't boot from a CD, floppy disk, or USB,
you can install across the network using PXE as described in the included
INSTALL.amd64 document.

<p>
If you are planning to dual boot OpenBSD with another OS, you will need to
read INSTALL.amd64.

<h3>OpenBSD/arm64:</h3>

<p>
Write <i>install73.img</i> or <i>miniroot73.img</i> to a disk and boot from it
after connecting to the serial console.  Refer to INSTALL.arm64 for more
details.

<h3>OpenBSD/armv7:</h3>

<p>
Write a system specific miniroot to an SD card and boot from it after connecting
to the serial console.  Refer to INSTALL.armv7 for more details.

<h3>OpenBSD/hppa:</h3>

<p>
Boot over the network by following the instructions in INSTALL.hppa or the
<a href="hppa.html#install">hppa platform page</a>.

<h3>OpenBSD/i386:</h3>

<p>
If your machine can boot from CD, you can write <i>install73.iso</i> or
<i>cd73.iso</i> to a CD and boot from it.
You may need to adjust your BIOS options first.

<p>
If your machine can boot from USB, you can write <i>install73.img</i> or
<i>miniroot73.img</i> to a USB stick and boot from it.

<p>
If you can't boot from a CD, floppy disk, or USB,
you can install across the network using PXE as described in
the included INSTALL.i386 document.

<p>
If you are planning on dual booting OpenBSD with another OS, you will need to
read INSTALL.i386.

<h3>OpenBSD/landisk:</h3>

<p>
Write <i>miniroot73.img</i> to the start of the CF
or disk, and boot normally.

<h3>OpenBSD/loongson:</h3>

<p>
Write <i>miniroot73.img</i> to a USB stick and boot bsd.rd from it
or boot bsd.rd via tftp.
Refer to the instructions in INSTALL.loongson for more details.

<h3>OpenBSD/luna88k:</h3>

<p>
Copy 'boot' and 'bsd.rd' to a Mach or UniOS partition, and boot the bootloader
from the PROM, and then bsd.rd from the bootloader.
Refer to the instructions in INSTALL.luna88k for more details.

<h3>OpenBSD/macppc:</h3>

<p>
Burn the image from a mirror site to a CDROM, and power on your machine
while holding down the <i>C</i> key until the display turns on and
shows <i>OpenBSD/macppc boot</i>.

<p>
Alternatively, at the Open Firmware prompt, enter <i>boot cd:,ofwboot
/7.3/macppc/bsd.rd</i>

<h3>OpenBSD/octeon:</h3>

<p>
After connecting a serial port, boot bsd.rd over the network via DHCP/tftp.
Refer to the instructions in INSTALL.octeon for more details.

<h3>OpenBSD/powerpc64:</h3>

<p>
To install, write <i>install73.img</i> or <i>miniroot73.img</i> to a
USB stick, plug it into the machine and choose the <i>OpenBSD
install</i> menu item in Petitboot.
Refer to the instructions in INSTALL.powerpc64 for more details.

<h3>OpenBSD/riscv64:</h3>

<p>
To install, write <i>install73.img</i> or <i>miniroot73.img</i> to a
USB stick, and boot with that drive plugged in.
Make sure you also have the microSD card plugged in that shipped with the
HiFive Unmatched board.
Refer to the instructions in INSTALL.riscv64 for more details.

<h3>OpenBSD/sparc64:</h3>

<p>
Burn the image from a mirror site to a CDROM, boot from it, and type
<i>boot cdrom</i>.

<p>
If this doesn't work, or if you don't have a CDROM drive, you can write
<i>floppy73.img</i> or <i>floppyB73.img</i>
(depending on your machine) to a floppy and boot it with <i>boot
floppy</i>. Refer to INSTALL.sparc64 for details.

<p>
Make sure you use a properly formatted floppy with NO BAD BLOCKS or your install
will most likely fail.

<p>
You can also write <i>miniroot73.img</i> to the swap partition on
the disk and boot with <i>boot disk:b</i>.

<p>
If nothing works, you can boot over the network as described in INSTALL.sparc64.
</section>

<hr>

<section id=upgrade>
<h3>How to upgrade</h3>
<p>
If you already have an OpenBSD 7.2 system, and do not want to reinstall,
upgrade instructions and advice can be found in the
<a href="faq/upgrade73.html">Upgrade Guide</a>.
</section>

<hr>

<section id=sourcecode>
<h3>Notes about the source code</h3>
<p>
<code>src.tar.gz</code> contains a source archive starting at <code>/usr/src</code>.
This file contains everything you need except for the kernel sources,
which are in a separate archive.
To extract:
<blockquote><pre>
# <kbd>mkdir -p /usr/src</kbd>
# <kbd>cd /usr/src</kbd>
# <kbd>tar xvfz /tmp/src.tar.gz</kbd>
</pre></blockquote>
<p>
<code>sys.tar.gz</code> contains a source archive starting at <code>/usr/src/sys</code>.
This file contains all the kernel sources you need to rebuild kernels.
To extract:
<blockquote><pre>
# <kbd>mkdir -p /usr/src/sys</kbd>
# <kbd>cd /usr/src</kbd>
# <kbd>tar xvfz /tmp/sys.tar.gz</kbd>
</pre></blockquote>
<p>
Both of these trees are a regular CVS checkout.  Using these trees it
is possible to get a head-start on using the anoncvs servers as
described <a href="anoncvs.html">here</a>.
Using these files
results in a much faster initial CVS update than you could expect from
a fresh checkout of the full OpenBSD source tree.
</section>

<hr>

<section id=ports>
<h3>Ports Tree</h3>
<p>
A ports tree archive is also provided.  To extract:
<blockquote><pre>
# <kbd>cd /usr</kbd>
# <kbd>tar xvfz /tmp/ports.tar.gz</kbd>
</pre></blockquote>
<p>
Go read the <a href="faq/ports/index.html">ports</a> page
if you know nothing about ports
at this point.  This text is not a manual of how to use ports.
Rather, it is a set of notes meant to kickstart the user on the
OpenBSD ports system.
<p>
The <i>ports/</i> directory represents a CVS checkout of our ports.
As with our complete source tree, our ports tree is available via
<a href="anoncvs.html">AnonCVS</a>.
So, in order to keep up to date with the -stable branch, you must make
the <i>ports/</i> tree available on a read-write medium and update the tree
with a command like:
<blockquote><pre>
# <kbd>cd /usr/ports</kbd>
# <kbd>cvs -d anoncvs@server.openbsd.org:/cvs update -Pd -rOPENBSD_7_3</kbd>
</pre></blockquote>
<p>
[Of course, you must replace the server name here with a nearby anoncvs
server.]
<p>
Note that most ports are available as packages on our mirrors. Updated
ports for the 7.3 release will be made available if problems arise.
<p>
If you're interested in seeing a port added, would like to help out, or just
would like to know more, the mailing list
<a href="mail.html">ports@openbsd.org</a> is a good place to know.
</section>
</body>
</html>